FacebookTwitterGoogle+RedditEmail

As the Surveillance Expands, Best Way to Resist is to Bury the NSA in Garbage

Word that Yahoo! last year, at the urging of the National Security Agency, secretly developed a program that monitored the mail of all 280 million of its customers and turned over to the NSA all mail from those who used any of the agency’s thousands of keywords, shows that the US has become a total police state in terms of trying to monitor every person in the country (and outside too).

With the courts, especially at the appellate and Supreme Court level, rolling over and supporting this massive evisceration of basic freedoms, including the First Amendment guarantee of freedom of speech and the Fourth Amendment protection against illegal search and seizure and invasion of privacy, perhaps the best way for us to fight back is to overload the spy system. How to do this? Just copy and paste random fragments of the following list (a bit dated, but useable), provided courtesy of the publication Business Insider, and include them in every communication — email, social media, etc. — that you send out.

The secret Yahoo! assault (reported on here by Alfredo Lopez in yesterday’s article), works by searching users’ emails for keywords on an NSA list of suspected words that might be used by alleged terrorists or anti-government activists, and then those suspect communications are forwarded to the NSA, where humans eventually have to separate the wheat from the chaff. Too much chaff (and they surely have too much chaff anyhow!) and they will be buried with work and unable to read anything.

In fact, critics of the government’s metastasizing universal surveillance program, including former FBI agents and other experts, have long criticized the effort to turn the US into a replica of East Germany with its Stazi secret police, cannot work and is actually counter-productive, because with spy agencies’ limited manpower looking at all the false leads provided by keyword monitoring, they are bound to miss the real dangerous messages. In fact, this was also the argument used against the FBI’s program of monitoring mosques and suspecting every Muslim American who expressed criticism of the US. Most are just people saying what a lot of us say: that the US wars in the Middle East are wrong or even criminal, but they are just citizens or immigrants exercising their free speech when they do this, not terrorists, and spying on them is and has been a huge waste or time and resources.

So, to help destroy the continuing and expanding effort to monitor everything we do, here’s a sample of the NSA’s keyword list:

Waihopai, INFOSEC, Information Security, Information Warfare, IW, IS, Priavacy, Information Terrorism, Terrorism Defensive Information, Defense Information Warfare, Offensive Information, Offensive Information Warfare, National Information Infrastructure, InfoSec, Reno, Compsec, Computer Terrorism, Firewalls, Secure Internet Connections, ISS, Passwords, DefCon V, Hackers, Encryption, Espionage, USDOJ, NSA, CIA, S/Key, SSL, FBI, Secert Service, USSS, Defcon, Military, White House, Undercover, NCCS, Mayfly, PGP, PEM, RSA, Perl-RSA, MSNBC, bet, AOL, AOL TOS, CIS, CBOT, AIMSX, STARLAN, 3B2, BITNET, COSMOS, DATTA, E911, FCIC, HTCIA, IACIS, UT/RUS, JANET, JICC, ReMOB, LEETAC, UTU, VNET, BRLO, BZ, CANSLO, CBNRC, CIDA, JAVA, Active X, Compsec 97, LLC, DERA, Mavricks, Meta-hackers, ^?, Steve Case, Tools, Telex, Military Intelligence, Scully, Flame, Infowar, Bubba, Freeh, Archives, Sundevil, jack, Investigation, ISACA, NCSA, spook words, Verisign, Secure, ASIO, Lebed, ICE, NRO, Lexis-Nexis, NSCT, SCIF, FLiR, Lacrosse, Flashbangs, HRT, DIA, USCOI, CID, BOP, FINCEN, FLETC, NIJ, ACC, AFSPC, BMDO, NAVWAN, NRL, RL, NAVWCWPNS, NSWC, USAFA, AHPCRC, ARPA, LABLINK, USACIL, USCG, NRC, ~, CDC, DOE, FMS, HPCC, NTIS, SEL, USCODE, CISE, SIRC, CIM, ISN, DJC, SGC, UNCPCJ, CFC, DREO, CDA, DRA, SHAPE, SACLANT, BECCA, DCJFTF, HALO, HAHO, FKS, 868, GCHQ, DITSA, SORT, AMEMB, NSG, HIC, EDI, SAS, SBS, UDT, GOE, DOE, GEO, Masuda, Forte, AT, GIGN, Exon Shell, CQB, CONUS, CTU, RCMP, GRU, SASR, GSG-9, 22nd SAS, GEOS, EADA, BBE, STEP, Echelon, Dictionary, MD2, MD4, MDA, MYK, 747,777, 767, MI5, 737, MI6, 757, Kh-11, Shayet-13, SADMS, Spetznaz, Recce, 707, CIO, NOCS, Halcon, Duress, RAID, Psyops, grom, D-11, SERT, VIP, ARC, S.E.T. Team, MP5k, DREC, DEVGRP, DF, DSD, FDM, GRU, LRTS, SIGDEV, NACSI, PSAC, PTT, RFI, SIGDASYS, TDM. SUKLO, SUSLO, TELINT, TEXTA. ELF, LF, MF, VHF, UHF, SHF, SASP, WANK, Colonel, domestic disruption, smuggle, 15kg, nitrate, Pretoria, M-14, enigma, Bletchley Park, Clandestine, nkvd, argus, afsatcom, CQB, NVD, Counter Terrorism Security, Rapid Reaction, Corporate Security, Police, sniper, PPS, ASIS, ASLET, TSCM, Security Consulting, High Security, Security Evaluation, Electronic Surveillance, MI-17, Counterterrorism, spies, eavesdropping, debugging, interception, COCOT, rhost, rhosts, SETA, Amherst, Broadside, Capricorn, Gamma, Gorizont, Guppy, Ionosphere, Mole, Keyhole, Kilderkin, Artichoke, Badger, Cornflower, Daisy, Egret, Iris, Hollyhock, Jasmine, Juile, Vinnell, B.D.M.,Sphinx, Stephanie, Reflection, Spoke, Talent, Trump, FX, FXR, IMF, POCSAG, Covert Video, Intiso, r00t, lock picking, Beyond Hope, csystems, passwd, 2600 Magazine, Competitor, EO, Chan, Alouette,executive, Event Security, Mace, Cap-Stun, stakeout, ninja, ASIS, ISA, EOD, Oscor, Merlin, NTT, SL-1, Rolm, TIE, Tie-fighter, PBX, SLI, NTT, MSCJ, MIT, 69, RIT, Time, MSEE, Cable & Wireless, CSE, Embassy, ETA, Porno, Fax, finks, Fax encryption, white noise, pink noise, CRA, M.P.R.I., top secret, Mossberg, 50BMG, Macintosh Security, Macintosh Internet Security, Macintosh Firewalls, Unix Security, VIP Protection, SIG, sweep, Medco, TRD, TDR, sweeping, TELINT, Audiotel, Harvard, 1080H, SWS, Asset, Satellite imagery, force, Cypherpunks, Coderpunks, TRW, remailers, replay, redheads, RX-7, explicit, FLAME, Pornstars, AVN, Playboy, Anonymous, Sex, chaining, codes, Nuclear, 20, subversives, SLIP, toad, fish, data havens, unix, c, a, b, d, the, Elvis, quiche, DES, 1*, NATIA, NATOA, sneakers, counterintelligence, industrial espionage, PI, TSCI, industrial intelligence, H.N.P., Juiliett Class Submarine, Locks, loch, Ingram Mac-10, sigvoice, ssa, E.O.D., SEMTEX, penrep, racal, OTP, OSS, Blowpipe, CCS, GSA, Kilo Class, squib, primacord, RSP, Becker, Nerd, fangs, Austin, Comirex, GPMG, Speakeasy, humint, GEODSS, SORO, M5, ANC, zone, SBI, DSS, S.A.I.C., Minox, Keyhole, SAR, Rand Corporation, Wackenhutt, EO, Wackendude, mol, Hillal, GGL, CTU, botux, Virii, CCC, Blacklisted 411, Internet Underground, XS4ALL, Retinal Fetish, Fetish, Yobie, CTP, CATO, Phon-e, Chicago Posse, l0ck, spook keywords, PLA, TDYC, W3, CUD, CdC, Weekly World News, Zen, World Domination, Dead, GRU, M72750, Salsa, 7, Blowfish, Gorelick, Glock, Ft. Meade, press-release, Indigo, wire transfer, e-cash, Bubba the Love Sponge, Digicash, zip, SWAT, Ortega, PPP, crypto-anarchy, AT&T, SGI, SUN, MCI, Blacknet, Middleman, KLM, Blackbird, plutonium, Texas, jihad, SDI, Uzi, Fort Meade, supercomputer, bullion, 3, Blackmednet, Propaganda, ABC, Satellite phones, Planet-1, cryptanalysis, nuclear, FBI, Panama, fissionable, Sears Tower, NORAD, Delta Force, SEAL, virtual, Dolch, secure shell, screws, Black-Ops, Area51, SABC, basement, data-haven, black-bag, TEMPSET, Goodwin, rebels, ID, MD5, IDEA, garbage, market, beef, Stego, unclassified, utopia, orthodox, Alica, SHA, Global, gorilla, Bob, Pseudonyms, MITM, Gray Data, VLSI, mega, Leitrim, Yakima, Sugar Grove, Cowboy, Gist, 8182, Gatt, Platform, 1911, Geraldton, UKUSA, veggie, 3848, Morwenstow, Consul, Oratory, Pine Gap, Menwith, Mantis, DSD, BVD, 1984, Flintlock, cybercash, government, hate, speedbump, illuminati, president, freedom, cocaine, $, Roswell, ESN, COS, E.T., credit card, b9, fraud, assasinate, virus, anarchy, rogue, mailbomb, 888, Chelsea, 1997, Whitewater, MOD, York, plutonium, William Gates, clone, BATF, SGDN, Nike, Atlas, Delta, TWA, Kiwi, PGP 2.6.2., PGP 5.0i, PGP 5.1, siliconpimp, Lynch, 414, Face, Pixar, IRIDF, eternity server, Skytel, Yukon, Templeton, LUK, Cohiba, Soros, Standford, niche, 51, H&K, USP, ^, sardine, bank, EUB, USP, PCS, NRO, Red Cell, Glock 26, snuffle, Patel, package, ISI, INR, INS, IRS, GRU, RUOP, GSS, NSP, SRI, Ronco, Armani, BOSS, Chobetsu, FBIS, BND, SISDE, FSB, BfV, IB, froglegs, JITEM, SADF, advise, TUSA, HoHoCon, SISMI, FIS, MSW, Spyderco, UOP, SSCI, NIMA, MOIS, SVR, SIN, advisors, SAP, OAU, PFS, Aladdin, chameleon man, Hutsul, CESID, Bess, rail gun, Peering, 17, 312, NB, CBM, CTP, Sardine, SBIRS, SGDN, ADIU, DEADBEEF, IDP, IDF, Halibut, SONANGOL, Flu, &, Loin, PGP 5.53, EG&G, AIEWS, AMW, WORM, MP5K-SD, 1071, WINGS, cdi, DynCorp, UXO, Ti, THAAD, package, chosen, PRIME, SURVIAC

***

 You’ll note, if you read through it, that the list itself is doing the job of overburdening the NSA’s staff. By including such commonly used words as flu, package, face, niche, package, credit card, fraud, basement, veggie (!), president, freedom (!), bank and Armani, they assure that there will be endless piles of communications that are completely innocuous that will have to be first read and examined for signs of terrorism. You’ll note too that there are some keywords that are even misspelled, meaning that the real words will be missed, for example: assassinate, priavacy(!), Secert Service and Hillal (is that supposed to be halal or Hillel I wonder?).

It’s also interesting to discover among the incriminating words that the NSA thinks might be used by potential “terrorists,” peculiar words like: freedom, veggie, sardine, Standford (sic), advisors, halibut, fish, Bubba the Love Sponge (really!), Playboy, dictionary and Zen (I’m sure there’s a great SNL skit in the works featuring a gang of Zen practitioners plotting their first terrorist action!).

Anyhow, have fun reading the list and selecting some of these choice keywords to sprinkling into your communications. Or you could just use them as a tag line to your emails, the way some people add inspirational sayings from the likes of Ben Franklin or Albert Einstein. Since the keyword list is so inclusive, you’re probably having your mail reviewed anyway, but why not make sure it is, just to keep the NSA occupied.

More articles by:

Dave Lindorff is a founding member of ThisCantBeHappening!, an online newspaper collective, and is a contributor to Hopeless: Barack Obama and the Politics of Illusion (AK Press).

Weekend Edition
July 20, 2018
Friday - Sunday
Paul Atwood
Peace or Armageddon: Take Your Pick
Paul Street
No Liberal Rallies Yet for the Children of Yemen
Nick Pemberton
The Bipartisan War on Central and South American Women
Jeffrey St. Clair
Roaming Charges: Are You Putin Me On?
Andrew Levine
Sovereignty: What Is It Good For? 
Brian Cloughley
The Trump/NATO Debacle and the Profit Motive
David Rosen
Trump’s Supreme Pick Escalates America’s War on Sex 
Melvin Goodman
Montenegro and the “Manchurian Candidate”
Salvador   Rangel
“These Are Not Our Kids”: The Racial Capitalism of Caging Children at the Border
Louis Proyect
Jeremy Corbyn, Bernie Sanders and the Dilemmas of the Left
Patrick Cockburn
Iraqi Protests: “Bad Government, Bad Roads, Bad Weather, Bad People”
Robert Fantina
Has It Really Come to This?
Russell Mokhiber
Kristin Lawless on the Corporate Takeover of the American Kitchen
Patrick Bobilin
In Your Period Piece, I Would be the Help
Ramzy Baroud
The Massacre of Inn Din: How Rohingya Are Lynched and Held Responsible
Robert Fisk
How Weapons Made in Bosnia Fueled Syria’s Bleak Civil War
Gary Leupp
Trump’s Helsinki Press Conference and Public Disgrace
Josh Hoxie
Our Missing $10 Trillion
Martha Rosenberg
Pharma “Screening” Is a Ploy to Seize More Patients
Basav Sen
Brett Kavanaugh Would be a Disaster for the Climate
David Lau
The Origins of Local AFT 4400: a Profile of Julie Olsen Edwards
Rohullah Naderi
The Elusive Pursuit of Peace by Afghanistan
John Laforge
18 Protesters Cut Into German Air Base to Protest US Nuclear Weapons Deployment
Christopher Brauchli
Trump and the Swedish Question
Chia-Chia Wang
Local Police Shouldn’t Collaborate With ICE
Paul Lyons
YouTube’s Content ID – A Case Study
Jill Richardson
Soon You Won’t be Able to Use Food Stamps at Farmers’ Markets, But That’s Not the Half of It
Thomas Knapp
Elections: More than Half of Americans Believe Fairy Tales are Real
Ralph Nader
Warner Slack—Doctor for the People Forever
Lee Ballinger
Soccer, Baseball and Immigration
Louis Yako
Celebrating the Wounds of Exile with Poetry
Ron Jacobs
Working Class Fiction—Not Just Surplus Value
Perry Hoberman
You Can’t Vote Out Fascism… You Have to Drive It From Power!
Robert Koehler
Guns and Racism, on the Rocks
Justin Anderson
Elon Musk vs. the Media
Graham Peebles
A Time of Hope for Ethiopia
Martin Billheimer
Childhood, Ferocious Sleep
Tom Clark
Gameplanning the Patriotic Retributive Attack on Montenegro
July 19, 2018
Rajai R. Masri
The West’s Potential Symbiotic Contributions to Freeing a Closed Muslim Mind
Jennifer Matsui
The Blue Pill Presidency
Ryan LaMothe
The Moral and Spiritual Bankruptcy of White Evangelicals
Paul Tritschler
Negative Capability: a Force for Change?
Patrick Bond
State of the BRICS Class Struggle: ‘Social Dialogue’ Reform Frustrations
Rev. William Alberts
A Well-Kept United Methodist Church Secret
Raouf Halaby
Joseph Harsch, Robert Fisk, Franklin Lamb: Three of the Very Best
FacebookTwitterGoogle+RedditEmail